Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
c89a8d3e1782c61a66ea739a77fb80c1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c89a8d3e1782c61a66ea739a77fb80c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c89a8d3e1782c61a66ea739a77fb80c1_JaffaCakes118.html
-
Size
6KB
-
MD5
c89a8d3e1782c61a66ea739a77fb80c1
-
SHA1
7d2cf6739c08a373cd9a55425271c40f9ef19a86
-
SHA256
b760d7bfe3c7a49d8cb499e40c0b0f8d19130d4cc6813df1149613cc7b38f666
-
SHA512
ab5ee9d81e708621819d5d8ca43d82f3b858f83ababe8a1f954754f5628b944e15846a364dff3fe126b6c92776b72e2ce6630cfe1ac900ab3693af3646a2030e
-
SSDEEP
48:fyhwf3ERHfvXD4xumsj0JBM/1wOMEGSM8rnOm/2AF7uQcRm8ahBhpoN4uqLN5ikb:qhM3sHfljAT6k18h93n1bGEWhWJaz1E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 3616 msedge.exe 3616 msedge.exe 4224 identity_helper.exe 4224 identity_helper.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 628 3616 msedge.exe 84 PID 3616 wrote to memory of 628 3616 msedge.exe 84 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 1320 3616 msedge.exe 85 PID 3616 wrote to memory of 4104 3616 msedge.exe 86 PID 3616 wrote to memory of 4104 3616 msedge.exe 86 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87 PID 3616 wrote to memory of 2636 3616 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c89a8d3e1782c61a66ea739a77fb80c1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3c4146f8,0x7ffe3c414708,0x7ffe3c4147182⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10203547586609872570,17497682399201528908,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5445d5a3ca11246dacb23b5420deac928
SHA11820314dd57b9c87de7b0b0847500d815bc9b091
SHA2567a1798cf0345d874ace511ff5bb6269d2f2e2b1028d91bc20716f08a95d0608d
SHA512b8ec041a4c52cbc42102d4568c2f812e88622eb2b934575887db5e6928fb611a0dbb5fc8ad264569d01275db33ff1ccc5bc05a7f6d8a67d33a2c9b75bb039405
-
Filesize
6KB
MD50ded789f6e50bc848eff6825e8987ac4
SHA15fd2d41590c75433990eb814b5778c6dbc84bd59
SHA256e6fe98939127d656d4a4f54460a0206df6e6737e21104de3f76dfd7d1f3e0f18
SHA512832c9d76a96452be43596448174a49aed4e56b017db53a81abb55a7c6b4e035bb050a586e13cbd78e6ad32e76239193bbf60794d7025b69c632d03261285872d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5be1f113380e8d0b744eeaf6fb6cd00c8
SHA14cb851f134bf842c7b8b46254937fb320c800eaa
SHA256f1639157533af4961f315933cf47ea0def018eb79758aa91e1e106ed610e6187
SHA5121e8aa4b1782689c2585df4ca3f556f2211ed54bced5b273ee23b61822be5db5cb68f0895fb5bf510a66a43dc1ab67bcd24dc420a993949b70be2833673cf24dd